US20080098213A1 - Method of Providing Digital Certificate Functionality - Google Patents

Method of Providing Digital Certificate Functionality Download PDF

Info

Publication number
US20080098213A1
US20080098213A1 US11/571,571 US57157105A US2008098213A1 US 20080098213 A1 US20080098213 A1 US 20080098213A1 US 57157105 A US57157105 A US 57157105A US 2008098213 A1 US2008098213 A1 US 2008098213A1
Authority
US
United States
Prior art keywords
key
string
data
authority
secret
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Abandoned
Application number
US11/571,571
Inventor
Thomas Andreas Maria Kevenaar
Geert Jan Schrijen
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Koninklijke Philips NV
Original Assignee
Koninklijke Philips Electronics NV
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Koninklijke Philips Electronics NV filed Critical Koninklijke Philips Electronics NV
Assigned to KONINKLIJKE PHILIPS ELECTRONICS N V reassignment KONINKLIJKE PHILIPS ELECTRONICS N V ASSIGNMENT OF ASSIGNORS INTEREST (SEE DOCUMENT FOR DETAILS). Assignors: KEVENAAR, THOMAS ANDREAS MARIA, SCHRIJEN, GEERT JAN
Publication of US20080098213A1 publication Critical patent/US20080098213A1/en
Abandoned legal-status Critical Current

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3263Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving certificates, e.g. public key certificate [PKC] or attribute certificate [AC]; Public key infrastructure [PKI] arrangements
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/30Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy
    • H04L9/3066Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy involving algebraic varieties, e.g. elliptic or hyper-elliptic curves
    • H04L9/3073Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy involving algebraic varieties, e.g. elliptic or hyper-elliptic curves involving pairings, e.g. identity based encryption [IBE], bilinear mappings or bilinear pairings, e.g. Weil or Tate pairing
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/30Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy
    • H04L9/3093Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy involving Lattices or polynomial equations, e.g. NTRU scheme
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L2209/00Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
    • H04L2209/60Digital content management, e.g. content distribution
    • H04L2209/603Digital right managament [DRM]

Definitions

  • the present invention relates to methods of providing digital certificate functionality, for example to a method of providing digital certificate functionality with implicit verification. Moreover, the invention also relates to apparatus and systems arranged to implement the methods. Furthermore, the invention concerns digital certificates and associated data generated when implementing the methods.
  • Digital certificates are cryptographic entities which are useful when implementing cryptographic systems.
  • a digital certificate is defined as being a digital signature issued by a certification authority (CA) on a corresponding string or message m. By issuing such a certificate, the CA thereby vouches for the authenticity of the string m. Other devices are able to verify authenticity of the string m by checking the signature.
  • CA certification authority
  • the certification authority owns a public-private key pair, wherein PCA, SCA denote public and private keys respectively.
  • the CA is operable to issue a certificate denoted by Cert CA (m) pertaining to a string m using its private key SCA.
  • E(y, x) denotes encryption of an item x using a key y
  • the certificate Cert CA (m) can take a form as described in Equation 1 (Eq. 1):
  • Equation 2 Equation 2
  • h denotes a one-way hash function for mapping an input of arbitrary length onto an output of length n to provide data compression, namely such that h(.), ⁇ 0,1 ⁇ * ⁇ 0,1 ⁇ ′′.
  • any device is then capable of explicitly verifying authenticity of the known string m by checking a decryption of the certificate Cert CA (m) using the CA's public key PCA against m, or h(m) as appropriate. In such a verification procedure, it is not required that the CA remains on-line during verification.
  • a common use for certificates is to bind a device's public key to its corresponding identity, for example the aforesaid certificate Cert CA (m) is used to associate a device's public key Pdev to its identity.
  • the string m preferably includes the device's public key Pdev as well as its identity and additional information to qualify the binding, for example an expiration temporal limit pertaining whilst the device received a private key Sdev over some secure authenticated channel.
  • the CA has a secret key KCA which it uses to generate an associated certificate Cert CA (m) according to Equation 3 or 4 (Eq. 3 or 4) as appropriate:
  • the device If a device possessing a copy of the string m and the certificate Cert CA (m) desires to verify authenticity of the copy of the string m, the device must supply to the CA the certificate Cert CA (m) and the string m. On receiving the certificate Cert CA (m), the CA will decrypt the received certificate Cert CA (m) using the CA's secret key KCA and then subsequently verify that the string m derived from the received certificate Cert CA (m) is equal to the received string m.
  • the string m in such a situation beneficially includes key material and other attributes as described in the foregoing.
  • symmetrical key techniques have associated therewith a problem that the CA needs to remain on-line for authentication purposes and the device requires the provision of an authenticated channel from the device to the CA, for example an authenticated channel based on a shared secret.
  • certificates based on the aforementioned public key techniques allow for more flexible cryptographic systems to be implemented which do not required an on-line connection to be provided to the CA in contradistinction to symmetrical key techniques which do require an on-line CA.
  • the public key techniques suffer a technical problem of being much more expensive in terms of hardware and power consumption of such hardware to implement the techniques.
  • An object of the present invention is to provide an alternative method of providing digital certification functionality.
  • a method of providing digital certification functionality in a network comprising a certification authority (CA) and at least first (A) and second (B) devices connectable in communication with the authority (CA), the method including steps of:
  • the method is of advantage in that verification or authentication of the protected data does not require on-line availability of the certifying authority.
  • accessing the protected data in step (e) is implemented without requiring on-line access to the authority during verification.
  • the secret P is a bi-variate polynomial.
  • the first key (k AB1 ) is a polynomial evaluated using a public string relating to the second device.
  • the signed string is communicated secretly from the authority to the first device (A). More preferably, such secret communication is achieved by using encryption techniques.
  • verification of the communicated protected data at the first device (A) is explicit.
  • verification of the communicated protected data at the first device (A) is implicit.
  • the method is based on at least one of: Blom's scheme, Identity Based Encryption (IBE).
  • IBE Identity Based Encryption
  • a communication system including a certification authority (CA) and a plurality of devices arranged in mutual communication, the system being operable according to the method of the first aspect of the invention.
  • CA certification authority
  • a digital certificate for data verification in a communication network operable according to a method of the first aspect of the invention.
  • the data includes audio and video program content.
  • FIG. 1 is a schematic diagram of a communication network comprising a certifying authority in communication with two devices, the authority and the devices being operable to mutually communicate using digital certification according to the invention;
  • FIG. 2 is a schematic diagram of certificate distribution in the network depicted in FIG. 1 ;
  • FIG. 3 is a schematic illustration of explicit string certification according to the invention.
  • FIG. 4 is a schematic illustration of implicit string certification according to the invention.
  • FIG. 5 is a schematic diagram of a system implementing digital certification functionality according to the invention.
  • the invention concerns a method of providing digital certification functionality as depicted in FIG. 1 .
  • a communication network indicated generally by 10 including a certification authority (CA) 20 , a first device (A) 30 and a second device (B) 40 .
  • the authority 20 and the devices 30 , 40 are coupled so that they are capable of mutually communicating.
  • the network 10 can be implemented as a communication system wherein the certification authority (CA) 20 is a server or database, and the devices are user apparatus coupled via the network 10 to the server or database.
  • the CA 20 chooses or generates a random secret P.
  • the CA 20 uses the secret P to sign a publicly disclosed string m A on behalf of the first device A 30 , whereafter the CA 20 secretly communicates the signed string m A to the first device A 30 as depicted by an arrow 50 in FIG. 1 .
  • the second device B 40 obtains some secret information denoted by an arrow 60 from the CA 20 and thereby enabling the second device B 40 to generate a key KAB to implicitly or explicitly verify the authenticity of the string m A .
  • the first device A 30 by using some publicly available information 70 on the second device B 40 , is operable to generate the key KAB provided that the string m A used by the device B is authentic.
  • the second device B 40 uses its key KAB to protect data (INFO) communicated as denoted by an arrow 80 from the second device B 40 to the first device A 30 .
  • the first device A 30 is operable to employ its key KAB to access the data (INFO).
  • FIG. 1 depicts the method of the invention in overview, its steps will now be elucidated in more detail.
  • the system 10 exploits polynomials in order to provide digital certificate functionality, more specifically a development based on Blom's key establishment scheme as described in a publication “Non-public key distribution”, Advances in Cryptology—Proceedings of Crypto 82 pp. 231-236, 1983 which is hereby incorporated by reference.
  • a network has N users, and every message transmitted in the network is enciphered with a key of M bits, said key being unique for each pair of source-destination users involved.
  • the scheme is operable to construct a key scheme that requires storage of a least possible number of bits at each user.
  • the number of bits required is referred as the size of the user storage denoted by S.
  • Equation 6 Equation 6
  • Equation 10 Equation 10
  • A is a symmetrical n ⁇ n element matrix.
  • Equation 12 Equation 12
  • Calculation of the key k ij then involves firstly calculating (j 0 , j 1 , . . . ,j n ⁇ 1 ) and then performing scalar multiplication of this vector and the vector b i .
  • the present invention employs certificate functionality based on polynomials, for example as utilized in Blom's scheme.
  • the CA chooses a random secret P(y, x) and then uses the secret to sign a public string m A to generate a signature for a device A.
  • the CA secretly sends this signature to the device A, for example by way of encryption.
  • Any device B also having obtained some secret information from the CA can explicitly or implicitly verify the authenticity of m A such that the device B uses the public string m A to generate a key k AB ; only the device A, by using some public information on the device B, is also capable of generating this key k AB provided that the string m A is authentic.
  • the device B is able to use the key k AB to protect data that it sends to the device A.
  • the CA then sends this uni-variate polynomial P(m A , x) to the device A.
  • the CA secret in the set-up phase, the CA secretly sends a polynomial P(b, x) to the device B wherein b is some public string referring to the device B.
  • Both the strings m A and b are public strings which can be stored in a public database or can be given to the devices A, B respectively.
  • FIG. 3 corresponds to explicit authentication according to the invention.
  • the device B is only able to send privileged information X to the device A subject to the content of the string m A .
  • the information X is, for example, audio or video content; moreover, the string m A preferably includes indications concerning whether or not the device A is authorized to play the content.
  • the device A sends a request “Req (X)” for the information X to be sent to it.
  • the device B In response to receiving the request “Req (X)”, the device B firstly retrieves the string m A . It then uses the string m A to verify whether or not the device A is allowed access to the information X, namely “Ver m A wrt X”.
  • FIG. 3 and associated description correspond to explicit authentication
  • FIG. 4 corresponds to implicit authentication.
  • Blom's scheme being preferably utilized in the present invention, a modified string m A arising in interaction between the two devices A, B will result in a failed authenticity check in a similar manner to normal public key certificates.
  • the device B requires assistance from the device A to verify authenticity of the string m A , therefore the device A is required to be accessible on-line; such on-line access is in contrast to public key certificates which accommodate verification by knowledge of a public key of the CA, namely public verification.
  • the schemes of FIGS. 1 to 4 rely on the devices A, B keeping the certificates P(m A , x), P(b, x) respectively secret; however, the device A does not always benefit from keeping the certificate P(m A , x) secret in contrast to contemporary cryptographic systems employing secret and private keys.
  • the device A can be regarded as being a compliant device which does not expose its private information; moreover, P(m A , X) is not only able to serve as a certificate but also behave as the device A's private key in which case it is disadvantageous for the device A to publish the certificate P(m A , x).
  • the security of public key certificates depends on some computationally hard problem, for example a discrete logarithm problem or the factoring of large prime numbers.
  • Security provided by the present invention described in the foregoing depends on properties of Blom's scheme which provides n-secure properties.
  • n is the degree of the polynomials for the secret P(y, x)
  • a potential attacker is required to use more than n polynomials to form P(m A , x) and to be able to generate the certificate P(m A ′, s).
  • the devices A, B only use polynomial evaluations in finite fields and symmetrical key encryption which is less computationally expensive than public key operations.
  • FIGS. 1 to 4 can be implemented based on other schemes than Blom's scheme.
  • the present invention as described in the foregoing can be arranged to employ Identity Based Encryption (IBE) as an alternative to Blom's scheme.
  • IBE is defined as being a public key encryption algorithm wherein a public key can be any string and a corresponding private key is computed such that it matches the public key.
  • IBE is clearly distinguished from other public key algorithms wherein only a private key can be chosen arbitrarily or wherein neither the public key nor its complementary private key can be chosen arbitrarily.
  • Blom's scheme An advantage of using Blom's scheme in the present invention is that a value used to evaluate for the certificate P(y, x) can be chosen arbitrarily and hence allows any information to be stored in this value. Moreover, this value is public and therefore serves substantially as a public key. Moreover, Blom's scheme when employed in the present invention is computationally simpler than using the IBE.
  • the string m A is used to store information which should be verifiable. In many practical situations, it is not practical to store information, for example program content, directly in the string m A as it would render the string inconveniently long. In order to address such a problem of unwieldy string size, it is preferably that the string includes a down-sized edited version, also known as a “digest”, of the information as described by Equation 13 (Eq. 13):
  • FIG. 5 there is shown a simple content management system indicated generally by 200 .
  • the system 200 includes a Content Rights Authority (CRA) 210 which is operable to issue content rights to devices included within the system 200 ; these content rights allow the devices to play, for example, a certain piece of content.
  • a right to play a given content C i is conveniently denoted by R Ci .
  • the CRA 210 is conveniently implemented as an “e-shop”, for example an Internet web-site.
  • the system 200 further comprises first and second Content Managers (CM 1 , CM 2 ) 220 , 230 respectively preferably implemented as trusted servers which contain or have access to content, preferably unencrypted content.
  • CM 1 , CM 2 Content Managers
  • the CM 1 , CM 2 220 , 230 are, for example, implemented as set-top boxes or other trusted devices interfacing to the Internet.
  • the system 200 also includes devices D 1 , D 2 , D 3 denoted by 300 , 310 , 320 respectively, these devices being operable to render content, for example replay content.
  • the devices 300 , 310 , 320 are preferably, in practice, implemented as video or audio rendering devices such as a video display or audio equipment.
  • the device D 1 300 obtains, for example by payment, right to play program content denoted by C 1 , C 2 and C 3 up to a certain time limit T 1 .
  • the device D 2 obtains, for example also by payment, rights to play the content C 1 and C 2 up to certain time T 2 .
  • the device D 3 obtains rights to play the content C 2 up to a time T 3 . Acquiring these rights for the devices D 1 , D 2 , D 3 enables the devices to receive publicly corresponding data content strings m D1 , m D2 , m D3 respectively as conveniently described by Equations 14, 15 and 16 (Eqs. 14, 15 and 16) and also included in FIG. 5 :
  • the devices D 1 , D 2 , D 3 In association with publicly receiving the strings m D1 , m D2 , m D3 , the devices D 1 , D 2 , D 3 also secretly receive corresponding polynomials P(h(m D1 ), x), P(h(m D2 ), x), P(h(m D3 ), x) respectively, wherein P(y, x) is a random symmetrical polynomial of sufficiently high degree as described in the foregoing, the polynomials for the devices D 1 , D 2 , D 3 being chosen by the Content Rights Authority (CRA 210 ).
  • CRA 210 Content Rights Authority
  • the CRA 210 accepts the CM 1 , CM 2 are trusted servers and they secretly receive polynomials P(h(CM 1 ),x), P(h(CM 2 ),x) respectively, both of these servers storing the contents C 1 , C 2 , C 3 .
  • the device D 1 sends a request to CM 1 for the content C 3 .
  • This request includes a reference to the requested content, namely ID C3 , and also the string m D1 as provided in Equation 14.
  • CM 1 220 verifies if rights R C3 for the requested content C 3 is comprised in the content string m D1 and also verifies whether of not the time at which the request is sent is earlier than the time T 1 . If all checks made in association with the request from the device D 1 300 are found to be valid, the CM 1 220 performs the following steps:
  • the device D 2 310 requests the content C 3 from CM 2 230 , the device D 2 does not have rights to the data content C 3 .
  • CM 2 will notice that RC 3 is not part of m D2 and therefore it will not send the data content C 3 to the device D 2 310 .
  • the device D 2 will not be able to compute the key K′ when it has access only to the polynomial P(h(m D2 ), x). Therefore, it is not possible for the device D 2 310 to decrypt the received content. Moreover, it is substantially impossible for the device D 2 310 to modify its content rights and gain access to the content C 3 .
  • every device D can request content from every CM and the CM will be able to explicitly or implicitly verify content rights.
  • the CRA 210 similarly in other related systems using public key security techniques, the CRA 210 only plays a role in issuing content rights not required on-line during content delivery. The devices D cannot modify content rights or the expiry time because they then cannot generate keys used by the CM's to encrypt or decrypt content.

Abstract

There is described a method of providing certification functionality. The method involves: (a) at a certification authority (20), generating a secret P, applying the secret P to sign a data string (mA) on behalf of a first device (30, A), and communicating (50) the signed string to the first device (30, A); (b) communicating (60) secret information from the authority (20) to a second device (B, 40), the secret information for verifying authenticity of the string (mA), the second device (40, B) being operable to use the secret information to generate a second key (kAB2); (c) generating a first key (kAB1) at the first device (30, A) using public information pertaining to the second device (40, B), said first key (kABI) being susceptible to generation provided that the string is authentic; (d) applying the second key (kAB2)to protect data for communication from the second device (40, B) to the first device (30, A); and (e) at the first device (30, A), applying the first key (kAB1)to access the protected data communicated from the second device (40, B) to the first device (30, A).

Description

    FIELD OF THE INVENTION
  • The present invention relates to methods of providing digital certificate functionality, for example to a method of providing digital certificate functionality with implicit verification. Moreover, the invention also relates to apparatus and systems arranged to implement the methods. Furthermore, the invention concerns digital certificates and associated data generated when implementing the methods.
  • BACKGROUND TO THE INVENTION
  • Digital certificates are cryptographic entities which are useful when implementing cryptographic systems. A digital certificate is defined as being a digital signature issued by a certification authority (CA) on a corresponding string or message m. By issuing such a certificate, the CA thereby vouches for the authenticity of the string m. Other devices are able to verify authenticity of the string m by checking the signature.
  • Conventionally, digital certificates are frequently implemented using public key techniques. In such techniques, the certification authority (CA) owns a public-private key pair, wherein PCA, SCA denote public and private keys respectively. Moreover, the CA is operable to issue a certificate denoted by CertCA(m) pertaining to a string m using its private key SCA. Conveniently, if E(y, x) denotes encryption of an item x using a key y, the certificate CertCA(m) can take a form as described in Equation 1 (Eq. 1):

  • Cert CA(m)=E(SCA,m)  Eq. 1
  • although alternative forms for the certificate CertCA(m) are potentially possible. In order to reduce data size of the certificate CertCA(m), the certificate more beneficially takes a form as described in Equation 2 (Eq. 2):

  • Cert CA(m)=E(SCA,h(m))  Eq. 2
  • wherein h denotes a one-way hash function for mapping an input of arbitrary length onto an output of length n to provide data compression, namely such that h(.), {0,1}*→{0,1}″. Thus, any device is then capable of explicitly verifying authenticity of the known string m by checking a decryption of the certificate CertCA(m) using the CA's public key PCA against m, or h(m) as appropriate. In such a verification procedure, it is not required that the CA remains on-line during verification.
  • Conventionally, a common use for certificates is to bind a device's public key to its corresponding identity, for example the aforesaid certificate CertCA(m) is used to associate a device's public key Pdev to its identity. In this case, the string m preferably includes the device's public key Pdev as well as its identity and additional information to qualify the binding, for example an expiration temporal limit pertaining whilst the device received a private key Sdev over some secure authenticated channel.
  • Similar functionality allowing verification of the authenticity of a string m can be obtained using known symmetrical key techniques. For such symmetrical techniques, the CA has a secret key KCA which it uses to generate an associated certificate CertCA(m) according to Equation 3 or 4 (Eq. 3 or 4) as appropriate:

  • Cert CA(m)=E(KCA,m)  Eq. 3
  • or

  • Cert CA(m)=E(KCA,h(m))  Eq. 4
  • which is published together with the string m. If a device possessing a copy of the string m and the certificate CertCA(m) desires to verify authenticity of the copy of the string m, the device must supply to the CA the certificate CertCA(m) and the string m. On receiving the certificate CertCA(m), the CA will decrypt the received certificate CertCA(m) using the CA's secret key KCA and then subsequently verify that the string m derived from the received certificate CertCA(m) is equal to the received string m. The string m in such a situation beneficially includes key material and other attributes as described in the foregoing. However, symmetrical key techniques have associated therewith a problem that the CA needs to remain on-line for authentication purposes and the device requires the provision of an authenticated channel from the device to the CA, for example an authenticated channel based on a shared secret.
  • Thus, certificates based on the aforementioned public key techniques allow for more flexible cryptographic systems to be implemented which do not required an on-line connection to be provided to the CA in contradistinction to symmetrical key techniques which do require an on-line CA. However, the public key techniques suffer a technical problem of being much more expensive in terms of hardware and power consumption of such hardware to implement the techniques.
  • Approaches to generating a common secret data item, for example for certification purposes, are known. For example, in a published international PCT patent application WO 2004/028075 there is described a method of generating a common secret data item between a first user facility and a second user facility. The method involves each user facility executing mutually symmetrical operations on respective complementary data items. These complementary data items are based on respectively unique quantities which are at least in part secret. An outcome of the symmetrical operations is used in user facilities as the aforesaid secret data item. In particular, the method is based on defining complementary data belonging to a GAP Diffie-Hellmann Problem that is defined in an Abelian Variety. More particularly, the Abelian Variety has unity dimension through being an elliptic curve.
  • The inventor has thus appreciated that known approaches to providing digital certification functionality suffer from various problems including one or more of hardware cost, hardware operating power consumption, a need for authenticated channels, and a requirement that the CA be available on-line. These problems have prompted the inventor to devise the present invention to try to at least partially address these problems.
  • SUMMARY OF THE INVENTION
  • An object of the present invention is to provide an alternative method of providing digital certification functionality.
  • According to a first aspect of the present invention, there is provided a method of providing digital certification functionality in a network comprising a certification authority (CA) and at least first (A) and second (B) devices connectable in communication with the authority (CA), the method including steps of:
  • (a) at the authority (CA), generating a secret P, applying the secret P to sign a data string (mA) on behalf of the first device (A), and then communicating the signed string to the first device (A);
    (b) communicating secret information from the authority to the second device (B), said secret information for verifying authenticity of the string (mA), the second device (B) being operable to use the secret information to generate a second key (kAB2) for verifying authenticity of the string (mA);
    (c) generating a first key (kAB1) at the first device (A) using public information pertaining to the second device (B), said first key (kAB1) being susceptible to generation provided that the string (mA) is authentic;
    (d) applying the second key (kAB2) to protect data for communication from the second device (B) to the first device (A); and
    (e) at the first device (A), applying the first key (kAB1) to access the protected data communicated from the second device (B) to the first device (A).
  • The method is of advantage in that verification or authentication of the protected data does not require on-line availability of the certifying authority.
  • Preferably, in the method, accessing the protected data in step (e) is implemented without requiring on-line access to the authority during verification.
  • Preferably, in the method, the secret P is a bi-variate polynomial.
  • Preferably, in the method, the first key (kAB1) is a polynomial evaluated using a public string relating to the second device.
  • Preferably, in step (a) of the method, the signed string is communicated secretly from the authority to the first device (A). More preferably, such secret communication is achieved by using encryption techniques.
  • Preferably, in the method, verification of the communicated protected data at the first device (A) is explicit. Alternatively, in the method, verification of the communicated protected data at the first device (A) is implicit.
  • Preferably, the method is based on at least one of: Blom's scheme, Identity Based Encryption (IBE).
  • According to a second aspect of the invention, there is provided a communication system including a certification authority (CA) and a plurality of devices arranged in mutual communication, the system being operable according to the method of the first aspect of the invention.
  • According to a third aspect of the invention, there is provided a digital certificate for data verification in a communication network operable according to a method of the first aspect of the invention.
  • According to a fourth aspect of the invention, there is provided encrypted data susceptible to verification by applying a method according to the first aspect of the invention. Preferably, the data includes audio and video program content.
  • It will be appreciated that features of the invention are susceptible to being combined in any combination without departing from the scope of the invention.
  • DESCRIPTION OF THE DIAGRAMS
  • Embodiments of the invention will now be described, by way of example only, with reference to the following diagrams wherein:
  • FIG. 1 is a schematic diagram of a communication network comprising a certifying authority in communication with two devices, the authority and the devices being operable to mutually communicate using digital certification according to the invention;
  • FIG. 2 is a schematic diagram of certificate distribution in the network depicted in FIG. 1;
  • FIG. 3 is a schematic illustration of explicit string certification according to the invention;
  • FIG. 4 is a schematic illustration of implicit string certification according to the invention; and
  • FIG. 5 is a schematic diagram of a system implementing digital certification functionality according to the invention.
  • DESCRIPTION OF EMBODIMENTS OF THE INVENTION
  • The inventors have envisaged that it is feasible to provide digital certification functionality based on polynomials. Such an approach is potentially cheaper to implement than aforementioned public key techniques, and is capable of providing further benefits of more flexibility than aforementioned symmetrical key techniques which require an on-line server.
  • In overview, the invention concerns a method of providing digital certification functionality as depicted in FIG. 1. In FIG. 1, there is shown a communication network indicated generally by 10 including a certification authority (CA) 20, a first device (A) 30 and a second device (B) 40. The authority 20 and the devices 30, 40 are coupled so that they are capable of mutually communicating. The network 10 can be implemented as a communication system wherein the certification authority (CA) 20 is a server or database, and the devices are user apparatus coupled via the network 10 to the server or database.
  • In a first step of the method, the CA 20 chooses or generates a random secret P. The CA 20 then uses the secret P to sign a publicly disclosed string mA on behalf of the first device A 30, whereafter the CA 20 secretly communicates the signed string mA to the first device A 30 as depicted by an arrow 50 in FIG. 1.
  • In a second step of the method, the second device B 40 obtains some secret information denoted by an arrow 60 from the CA 20 and thereby enabling the second device B 40 to generate a key KAB to implicitly or explicitly verify the authenticity of the string mA.
  • In a third step of the method, the first device A 30, by using some publicly available information 70 on the second device B 40, is operable to generate the key KAB provided that the string mA used by the device B is authentic.
  • In a fourth step of the method, the second device B 40 uses its key KAB to protect data (INFO) communicated as denoted by an arrow 80 from the second device B 40 to the first device A 30. The first device A 30 is operable to employ its key KAB to access the data (INFO).
  • Although FIG. 1 depicts the method of the invention in overview, its steps will now be elucidated in more detail. The system 10 exploits polynomials in order to provide digital certificate functionality, more specifically a development based on Blom's key establishment scheme as described in a publication “Non-public key distribution”, Advances in Cryptology—Proceedings of Crypto 82 pp. 231-236, 1983 which is hereby incorporated by reference.
  • In Blom's scheme, a network has N users, and every message transmitted in the network is enciphered with a key of M bits, said key being unique for each pair of source-destination users involved. The scheme is operable to construct a key scheme that requires storage of a least possible number of bits at each user. In the scheme, the number of bits required is referred as the size of the user storage denoted by S. When there are N users in the network such that each user is defined by a unique user number i in a range of 0 to N−1, a user address ai of user i is expressible as a vector as described in Equation 5 (Eq. 5):

  • a i=(a i0 ,a i1 , . . . ,a i(l−1))  Eq. 5
  • where 1=logb(N) and wherein user numbers in a radix b are included as described by Equation 6 (Eq. 6):
  • i = m = 0 l - 1 a im b m Eq . 6
  • There is also defined cumulative functions f according to Equations 7 to 9 (Eq. 7 to 9):

  • f m(x,y)−f m(y,x)  Eq. 7
  • wherein

  • x,yε{0,1,2, . . . ,b−1}  Eq. 8

  • mε{0, . . . ,l−1}  Eq. 9
  • In Blom's scheme, a key kij for communication between users i and j is then described by Equation 10 (Eq. 10):
  • k ij = m = 0 l - 1 f m ( a im , a jm ) Eq . 10
  • wherein it is assumed that functions fm(.,.) have subsets of the Galois field GF(2M) as their respective range of values and do not have any other property than commutativity. In calculating keys kij according to Blom's scheme, the user i always uses fm(aim,.) and thus only has to store b values for each function.
  • The Blom's scheme uses a polynomial p(x,y) in the Galois field GF(q), the polynomial p(x, y) having a property that p(x,y)=p(y, x) and that each user is associated with an unique element i in the Galois field GF(q) where the element i is useable to identify the user. It is also assumed that q is in the order of 2M for representing the elements of the Galois field GF(q) with M bits. To generate a key for users i and j, the polynomial p(i, j) is evaluated. Thus, a specific user i only needs to know the polynomial p(i, y) so that each user only knows a part of the total polynomial, the polynomial being defined by Equation 11 (Eq. 11):

  • p(x,y)=(x 0 ,x 1 , . . . ,x n−1)A(y 0 ,y 1 , . . . ,y n−1)T  Eq. 11
  • wherein A is a symmetrical n×n element matrix.
  • Each user only has to store n coefficients in the form of the vector bi as described by Equation 12 (Eq. 12):

  • b i=(i 0 ,i 1 , . . . ,i n−1)A  Eq. 12
  • Calculation of the key kij then involves firstly calculating (j0, j1, . . . ,jn−1) and then performing scalar multiplication of this vector and the vector bi.
  • The present invention employs certificate functionality based on polynomials, for example as utilized in Blom's scheme. In general terms, as depicted in FIG. 2, the CA chooses a random secret P(y, x) and then uses the secret to sign a public string mA to generate a signature for a device A. The CA secretly sends this signature to the device A, for example by way of encryption. Any device B also having obtained some secret information from the CA can explicitly or implicitly verify the authenticity of mA such that the device B uses the public string mA to generate a key kAB; only the device A, by using some public information on the device B, is also capable of generating this key kAB provided that the string mA is authentic. Thus, the device B is able to use the key kAB to protect data that it sends to the device A.
  • In FIG. 2, an initial set-up phase is implemented wherein the CA chooses a random, secret and a symmetrical bi-variate polynomial P(x,y) such that P(x,y)=P(y, x) for all x and y. The CA evaluates the polynomial P(y, x) as in y=mA to obtain a polynomial P(mA, x) wherein P(mA, x) is a signature on mA. The CA then sends this uni-variate polynomial P(mA, x) to the device A. Moreover, in the set-up phase, the CA secretly sends a polynomial P(b, x) to the device B wherein b is some public string referring to the device B. Both the strings mA and b are public strings which can be stored in a public database or can be given to the devices A, B respectively.
  • After the aforementioned set-up phase, if the device B explicitly wants to verify the authenticity of a version of the string mA in its possession, for example as depicted in FIG. 3, the device B implements a verification step. In the verification step, the device B chooses a random number r. Thereafter, the device B evaluates the polynomial P(b, x) by equating x=mA to obtain a key kAB=P(b, mA). Next, the device B encrypts the random number r using the key kAB, namely the device B determines E(kAB, r) and sends this encryption to the device A.
  • On reception of the encryption E(kAB, r), the device A evaluates the polynomial P(mA, x) wherein x=b in order to obtain a derived key k′AB=P(mA, b). Next, the device A then sends a number r′=D(kAB′, E(kAB, r)) to the device B wherein D denotes decryption. The device B then only accepts the authenticity of mA provided that the numbers r=r′ as verification. In such verification after the set-up phase, the CA is not involved, although the device A is required to be available on-line. FIG. 3 corresponds to explicit authentication according to the invention.
  • As depicted in FIG. 4, the device B is only able to send privileged information X to the device A subject to the content of the string mA. The information X is, for example, audio or video content; moreover, the string mA preferably includes indications concerning whether or not the device A is authorized to play the content. Thus, in a practical use of the present invention, the device A sends a request “Req (X)” for the information X to be sent to it. In response to receiving the request “Req (X)”, the device B firstly retrieves the string mA. It then uses the string mA to verify whether or not the device A is allowed access to the information X, namely “Ver mA wrt X”. If the device B finds that the device A is indeed permitted to access the information X, the device B computes the key “kAB=P(b, mA)” and then proceeds to encrypt the information using the key kAB, namely “E(kAB, X), and sends the encryption to the device A.
  • Upon receipt of the encryption, the device A computes a key “kAB′=P(mA, b) and then computes the content as “X′=D(kAB′, E(kAB, X)”. In a situation where the string mAused by the device B is authentic, the device A will compute a proper value for the key, namely the keys kAB and kAB′ will correspond, so the device A is able to access the information X. Conversely, in an event of mA being modified to the string mA′, the device B will not be able to verify explicitly the authenticity of mA′ but will generate a key kAB′=P(b, mA′) and use it to encrypt the information X; on account of properties of the Blom's scheme incorporated into the present invention, the device A will not be able to compute the key kAB′ knowing only mA′ and P(mA, X) and the device B then implicitly verifies the authenticity of the string mA. In both cases, the device A is able to verify authenticity provided that the device B is the originator of the messages, for example B adds a Message Authentication Code to the message sent to the device A.
  • Whereas FIG. 3 and associated description correspond to explicit authentication, FIG. 4 corresponds to implicit authentication.
  • The invention as described in the foregoing superficially resembles public key certificates in the respect that on-line access to the CA 20 is not required to certify authenticity of the string mA. On account of Blom's scheme being preferably utilized in the present invention, a modified string mA arising in interaction between the two devices A, B will result in a failed authenticity check in a similar manner to normal public key certificates. However, there are significant differences between the present invention and public key certificate systems.
  • In schemes illustrated in FIGS. 1 to 4, the device B requires assistance from the device A to verify authenticity of the string mA, therefore the device A is required to be accessible on-line; such on-line access is in contrast to public key certificates which accommodate verification by knowledge of a public key of the CA, namely public verification.
  • Moreover, the schemes of FIGS. 1 to 4 rely on the devices A, B keeping the certificates P(mA, x), P(b, x) respectively secret; however, the device A does not always benefit from keeping the certificate P(mA, x) secret in contrast to contemporary cryptographic systems employing secret and private keys. In the invention, the device A can be regarded as being a compliant device which does not expose its private information; moreover, P(mA, X) is not only able to serve as a certificate but also behave as the device A's private key in which case it is disadvantageous for the device A to publish the certificate P(mA, x).
  • In schemes of FIGS. 1 to 4, the security of public key certificates depends on some computationally hard problem, for example a discrete logarithm problem or the factoring of large prime numbers. Security provided by the present invention described in the foregoing depends on properties of Blom's scheme which provides n-secure properties. Thus, if n is the degree of the polynomials for the secret P(y, x), a potential attacker is required to use more than n polynomials to form P(mA, x) and to be able to generate the certificate P(mA′, s). In schemes of the invention, the devices A, B only use polynomial evaluations in finite fields and symmetrical key encryption which is less computationally expensive than public key operations.
  • The invention illustrated in FIGS. 1 to 4 can be implemented based on other schemes than Blom's scheme. For example, the present invention as described in the foregoing can be arranged to employ Identity Based Encryption (IBE) as an alternative to Blom's scheme. IBE is defined as being a public key encryption algorithm wherein a public key can be any string and a corresponding private key is computed such that it matches the public key. IBE is clearly distinguished from other public key algorithms wherein only a private key can be chosen arbitrarily or wherein neither the public key nor its complementary private key can be chosen arbitrarily.
  • An advantage of using Blom's scheme in the present invention is that a value used to evaluate for the certificate P(y, x) can be chosen arbitrarily and hence allows any information to be stored in this value. Moreover, this value is public and therefore serves substantially as a public key. Moreover, Blom's scheme when employed in the present invention is computationally simpler than using the IBE.
  • It will be appreciated that embodiments of the invention described in the foregoing are susceptible to being modified without departing from the scope of the invention as defined by the accompanying claims.
  • In the present invention depicted in FIGS. 1 to 4, the devices A, B derive a key P(mA, b)=P(b, mA); conveniently, this key is referred to as a “master key”. It is often desirable to derive a random key based on this master key so that a new random key is generated for each session. At least several hundred standard protocols can potentially be used to derive a random key based on a common master key as described in a publication “Handbook of Applied Cryptography” by A. Menezes, P. van Oorschot and S. van Stone, published by CRC Press 1996 which is hereby incorporated by reference.
  • Thus, in the context of the present invention, the string mA is used to store information which should be verifiable. In many practical situations, it is not practical to store information, for example program content, directly in the string mA as it would render the string inconveniently long. In order to address such a problem of unwieldy string size, it is preferably that the string includes a down-sized edited version, also known as a “digest”, of the information as described by Equation 13 (Eq. 13):

  • m=h(m D1)  Eq. 13
  • using the aforementioned one-way hash function.
  • A further embodiment of the invention will be described, the embodiment utilizing certification functionality as described in the foregoing.
  • In FIG. 5, there is shown a simple content management system indicated generally by 200. The system 200 includes a Content Rights Authority (CRA) 210 which is operable to issue content rights to devices included within the system 200; these content rights allow the devices to play, for example, a certain piece of content. A right to play a given content Ci is conveniently denoted by RCi. In practice, the CRA 210 is conveniently implemented as an “e-shop”, for example an Internet web-site. The system 200 further comprises first and second Content Managers (CM1, CM2) 220, 230 respectively preferably implemented as trusted servers which contain or have access to content, preferably unencrypted content. The CM1, CM 2 220, 230 are, for example, implemented as set-top boxes or other trusted devices interfacing to the Internet. Moreover, the system 200 also includes devices D1, D2, D3 denoted by 300, 310, 320 respectively, these devices being operable to render content, for example replay content. The devices 300, 310, 320 are preferably, in practice, implemented as video or audio rendering devices such as a video display or audio equipment.
  • Operation of the system 200 will now be described with reference to FIG. 5.
  • In the system 200, the device D1 300 obtains, for example by payment, right to play program content denoted by C1, C2 and C3 up to a certain time limit T1. Similarly, the device D2 obtains, for example also by payment, rights to play the content C1 and C2 up to certain time T2. Moreover, the device D3 obtains rights to play the content C2 up to a time T3. Acquiring these rights for the devices D1, D2, D3 enables the devices to receive publicly corresponding data content strings mD1, mD2, mD3 respectively as conveniently described by Equations 14, 15 and 16 (Eqs. 14, 15 and 16) and also included in FIG. 5:

  • m D1 =D1∥R C1 ∥R C2 ∥R C3 ∥T 1  Eq. 14

  • m D2 =D2∥R C1 ∥R C2 ∥T 2  Eq. 15

  • m D3 =D3∥R C2 ∥T 3  Eq. 16
  • where ∥ denotes concatenation. In association with publicly receiving the strings mD1, mD2, mD3, the devices D1, D2, D3 also secretly receive corresponding polynomials P(h(mD1), x), P(h(mD2), x), P(h(mD3), x) respectively, wherein P(y, x) is a random symmetrical polynomial of sufficiently high degree as described in the foregoing, the polynomials for the devices D1, D2, D3 being chosen by the Content Rights Authority (CRA 210).
  • The CRA 210 accepts the CM1, CM2 are trusted servers and they secretly receive polynomials P(h(CM1),x), P(h(CM2),x) respectively, both of these servers storing the contents C1, C2, C3.
  • In operation, the device D1 sends a request to CM1 for the content C3. This request includes a reference to the requested content, namely IDC3, and also the string mD1 as provided in Equation 14. Upon reception of this request, CM 1 220 verifies if rights RC3 for the requested content C3 is comprised in the content string mD1 and also verifies whether of not the time at which the request is sent is earlier than the time T1. If all checks made in association with the request from the device D1 300 are found to be valid, the CM 1 220 performs the following steps:
  • (a) the CM 1 220 computes a down-sized edited version of the string mD1, namely a string m=h(mD1);
    (b) the CM 1 220 evaluates a polynomial P(h(CM1),x) wherein x=m from (a) above to obtain a polynomial decryption key K;
    (c) the CM 1 220 computes an encrypted version of the content C3 using the K from (b) above, namely E(K, C3);
    (d) the CM 1 220 sends the encrypted version E(K, C3) of the content C3 to the device D1 300.
  • Upon receipt at the device D1 300 of encrypted data E(K, C3) sent from CM 1 220, the device D1 300 evaluates a polynomial P(h(mD1), x) wherein x=h(CM1) to obtain a decryption key K′. Next, the device D1 processes the encrypted data E(K, C3) to derive a decrypted version C3′ of the data content C3 according to Equation 17 (Eq. 17):

  • C 3 =D(K′,E(K,C 3))  Eq. 17
  • Assuming that the device D 2 310 requests the content C3 from CM 2 230, the device D2 does not have rights to the data content C3. When CM2 receives the request for the content C3 and the string mD2=D2∥RC1∥RC2∥T2, CM2 will notice that RC3 is not part of mD2 and therefore it will not send the data content C3 to the device D 2 310. Clearly, the device D 2 310 could send a modified string m′D2=D2∥RC1∥RC3∥T2 to CM2. CM2 will accept this modified string, evaluate P(h(CM2),x) in x=h(m′D2) to obtain the key K′ and send E(K′, C3) to the device D2. However, the device D2 will not be able to compute the key K′ when it has access only to the polynomial P(h(mD2), x). Therefore, it is not possible for the device D 2 310 to decrypt the received content. Moreover, it is substantially impossible for the device D 2 310 to modify its content rights and gain access to the content C3.
  • Clearly, in the system 200, every device D can request content from every CM and the CM will be able to explicitly or implicitly verify content rights. In the system 200, similarly in other related systems using public key security techniques, the CRA 210 only plays a role in issuing content rights not required on-line during content delivery. The devices D cannot modify content rights or the expiry time because they then cannot generate keys used by the CM's to encrypt or decrypt content.
  • In the accompanying claims, numerals and other symbols included within brackets are included to assist understanding of the claims and are not intended to limit the scope of the claims in any way.
  • Expressions such as “comprise”, “include”, “incorporate”, “contain”, “is” and “have” are to be construed in a non-exclusive manner when interpreting the description and its associated claims, namely construed to allow for other items or components which are not explicitly defined also to be present. Reference to the singular is also to be construed to be a reference to the plural and vice versa.

Claims (13)

1. A method of providing digital certification functionality in a network (10) comprising a certification authority (20) and at least first and second devices (30, 40) connectable in communication with the authority (20), the method including steps of:
(a) at the authority (20), generating a secret P, applying the secret P to sign a data string (mA) on behalf of the first device (30, A), and then communicating (50) the signed string to the first device (30, A);
(b) communicating (60) secret information from the authority (20) to the second device (B, 40), said secret information for verifying authenticity of the string (mA), said second device (40, B) being operable to use the secret information to generate a second key (kAB2) for verifying authenticity of the string (mA);
(c) generating a first key (kAB1) at the first device (30, A) using public information pertaining to the second device (40, B), said first key (kAB1) being susceptible to generation provided that the string (mA) is authentic;
(d) applying the second key (kAB2) to protect data for communication from the second device (40, B) to the first device (30, A); and
(e) at the first device (30, A), applying the first key (kAB1) to access the protected data communicated from the second device (40, B) to the first device (30, A).
2. A method according to claim 1, wherein accessing the protected data in step (e) is implemented without requiring on-line access to the authority (20) during verification.
3. A method according to claim 1, wherein the secret P is a bi-variate polynomial.
4. A method according to claim 1, wherein the first key (kAB1) is a polynomial evaluated using a public string relating to the second device (40, B).
5. A method according to claim 1, wherein, in step (a), the signed string is communicated secretly from the authority (20) to the first device (30, A).
6. A method according to claim 5, wherein the signed string is communicated secretly using encryption techniques,
7. A method according to claim 1, wherein verification of the communicated protected data at the first device (30, A) is explicit.
8. A method according to claim 1, wherein verification of the communicated protected data at the first device (30, A) is implicit.
9. A method according to claim 1 based on at least one of: Blom's scheme, Identity Based Encryption (IBE).
10. A communication system (10) including a certification authority (CA, 20) and a plurality of devices (30, 40) arranged in mutual communication, the system (10) being operable according to the method of claim 1.
11. A digital certificate for data verification in a communication network (10) operable according to a method of claim 1.
12. Encrypted data susceptible to verification by applying a method according to claim 1.
13. Encrypted data according to claim 12, said data including audio and/or video program content.
US11/571,571 2004-07-08 2005-07-04 Method of Providing Digital Certificate Functionality Abandoned US20080098213A1 (en)

Applications Claiming Priority (3)

Application Number Priority Date Filing Date Title
EP04103254 2004-07-08
EP04103254.1 2004-07-08
PCT/IB2005/052224 WO2006006124A1 (en) 2004-07-08 2005-07-04 Method of providing digital certificate functionality

Publications (1)

Publication Number Publication Date
US20080098213A1 true US20080098213A1 (en) 2008-04-24

Family

ID=35044942

Family Applications (1)

Application Number Title Priority Date Filing Date
US11/571,571 Abandoned US20080098213A1 (en) 2004-07-08 2005-07-04 Method of Providing Digital Certificate Functionality

Country Status (5)

Country Link
US (1) US20080098213A1 (en)
EP (1) EP1766849A1 (en)
JP (1) JP2008506293A (en)
CN (1) CN1981477A (en)
WO (1) WO2006006124A1 (en)

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20070094494A1 (en) * 2005-10-26 2007-04-26 Honeywell International Inc. Defending against sybil attacks in sensor networks
US20110029778A1 (en) * 2008-04-14 2011-02-03 Koninklijke Philips Electronics N.V. Method for distributed identification, a station in a network
US20150098566A1 (en) * 2012-07-31 2015-04-09 Mitsubishi Electric Corporation Cryptographic system, cryptographic method, cryptographic program, and decryption device

Families Citing this family (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US8370625B2 (en) 2008-06-11 2013-02-05 Microsoft Corporation Extended data signing
CN113256886B (en) * 2021-04-15 2022-12-09 桂林电子科技大学 Smart grid power consumption statistics and charging system and method with privacy protection function

Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6792530B1 (en) * 1998-03-23 2004-09-14 Certicom Corp. Implicit certificate scheme
US7480795B2 (en) * 2000-06-09 2009-01-20 Certicom Corp. Method for the application of implicit signature schemes

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP1486027B1 (en) * 2002-03-13 2005-12-28 Koninklijke Philips Electronics N.V. Polynomial-based multi-user key generation and authentication method and system

Patent Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6792530B1 (en) * 1998-03-23 2004-09-14 Certicom Corp. Implicit certificate scheme
US7480795B2 (en) * 2000-06-09 2009-01-20 Certicom Corp. Method for the application of implicit signature schemes

Cited By (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20070094494A1 (en) * 2005-10-26 2007-04-26 Honeywell International Inc. Defending against sybil attacks in sensor networks
US20110029778A1 (en) * 2008-04-14 2011-02-03 Koninklijke Philips Electronics N.V. Method for distributed identification, a station in a network
US9553726B2 (en) * 2008-04-14 2017-01-24 Koninklijke Philips N.V. Method for distributed identification of a station in a network
US10327136B2 (en) 2008-04-14 2019-06-18 Koninklijke Philips N.V. Method for distributed identification, a station in a network
US20150098566A1 (en) * 2012-07-31 2015-04-09 Mitsubishi Electric Corporation Cryptographic system, cryptographic method, cryptographic program, and decryption device
US9413531B2 (en) * 2012-07-31 2016-08-09 Mitsubishi Electric Corporation Cryptographic system, cryptographic method, cryptographic program, and decryption device

Also Published As

Publication number Publication date
CN1981477A (en) 2007-06-13
JP2008506293A (en) 2008-02-28
EP1766849A1 (en) 2007-03-28
WO2006006124A1 (en) 2006-01-19

Similar Documents

Publication Publication Date Title
US10903991B1 (en) Systems and methods for generating signatures
US9111115B2 (en) Oblivious transfer with hidden access control lists
US7152158B2 (en) Public key certificate issuing system, public key certificate issuing method, information processing apparatus, information recording medium, and program storage medium
Paquin et al. U-prove cryptographic specification v1. 1
US9071445B2 (en) Method and system for generating implicit certificates and applications to identity-based encryption (IBE)
US20040165728A1 (en) Limiting service provision to group members
CN104821880B (en) One kind is without certificate broad sense agent signcryption method
US20070174618A1 (en) Information security apparatus and information security system
US20050005121A1 (en) Cryptographic method and apparatus
JP2004015241A (en) Encryption communication system, terminal apparatus and server therefor, and decoding method
WO2019110399A1 (en) Two-party signature device and method
US20080098213A1 (en) Method of Providing Digital Certificate Functionality
Gritti et al. Broadcast encryption with dealership
CN111756722B (en) Multi-authorization attribute-based encryption method and system without key escrow
CN116318696B (en) Proxy re-encryption digital asset authorization method under condition of no initial trust of two parties
Yin et al. PKI-based cryptography for secure cloud data storage using ECC
Wu et al. A publicly verifiable PCAE scheme for confidential applications with proxy delegation
Barker et al. SP 800-56A. recommendation for pair-wise key establishment schemes using discrete logarithm cryptography (revised)
Mishra et al. A certificateless authenticated key agreement protocol for digital rights management system
CN113141249B (en) Threshold decryption method, system and readable storage medium
KR20070030883A (en) Method of providing digital certificate functionality
Zhong Secure Digital Certificate Design Based on the RSA Algorithm.
KR101133093B1 (en) Method for providing user with encryption and digital signature using single certificate
KR20230127905A (en) Apparatus for generating blind signature and method thereof
CN115906106A (en) Data access control method and attribute authority server

Legal Events

Date Code Title Description
AS Assignment

Owner name: KONINKLIJKE PHILIPS ELECTRONICS N V, NETHERLANDS

Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNORS:KEVENAAR, THOMAS ANDREAS MARIA;SCHRIJEN, GEERT JAN;REEL/FRAME:018701/0881

Effective date: 20060202

STCB Information on status: application discontinuation

Free format text: ABANDONED -- FAILURE TO RESPOND TO AN OFFICE ACTION